Discuss a minimum of five event types found in a dhcp log

Assignment Help Computer Networking
Reference no: EM13807558

You are a Network Administrator in Net Ambit Inc. The company has one External IP, five servers (Static). One of them handles DHCP (2k3), 12 printers (Static), 175 wired personal computers (PCs) or users (DHCP). This is a new facility or set up and no IPs have been assigned to you.

You're logged on locally to a user's computer and your mapping batch file didn't run and you need to get a file from one of your servers. You have been told that your Internet connection has been set-up and ready for use. You already know how many devices will be connected to your network in the beginning so it's now time to lay out a plan.

Based on your understanding of the above scenario, create a report in a Microsoft Word document answering the following:

  • What plan will you layout in terms of your proposal for listing IP addresses if your first IP is 192.167.1.0 and your last is 192.167.1.255?

You have ten printers that will be used by multiple users.

  • What plan will you follow to assign printers to all the users in the organization?

While learning how to read a DHCP Log File, there are various event IDs which detail events.

  • Discuss a minimum of five event types found in a DHCP log and describe what they refer to.

Finally, you have 175 PCs that will all be hardwired to the LAN and will each need an IP.

  • How will you use your network administrator skills and knowledge in assigning IPs to each user?

Reference no: EM13807558

Questions Cloud

Write the development and testing portion : You will write the development and testing portion of the software development plan. Identify the key phases of the project that will be subject to testing and the type of testing to be used during that phase
Assignment famine affluence and morality : Assignment Famine Affluence and Morality
Several risk mitigation strategies : How does sensitivity analysis relate to contingency planning? What are several risk mitigation strategies that you could implement to desensitize these variables?
Conduct a preliminary assessment : Select either an international service organization or a multinational corporation and conduct a preliminary assessment of their website.
Discuss a minimum of five event types found in a dhcp log : What plan will you follow to assign printers to all the users in the organization? Discuss a minimum of five event types found in a DHCP log and describe what they refer to
Policy summary : Policy Summary
Task of leading a cross-functional team : A pet project of top management has been given the green light. You are assigned the task of leading a cross-functional team that includes a 20 year veteran to the company, a recent college graduate and a wage employee.
The six qualitative field research paradigms : Identify a sociological topic of interest to you. Discuss how each of the six qualitative field research paradigms (naturalism, ethnomethodology, grounded theory, case studies and extended case method, institutional ethnography, participatory action ..
Constructive feedback to person : In the past, you have had problems with this individual's ability to meet deadlines on teams you have worked on. How would you provide constructive feedback to this person without causing any ill will between the two of you?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd